Host & Network Penetration Testing: Exploitation

Exploitation

Course Topic Overview

  • Introduction To Exploitation

  • Vulnerability Scanning

  • Searching For Exploits

  • Fixing Exploits

  • Bind & Reverse Shells

  • Exploitation Frameworks: Se realizara con Metasploit y powershell

  • Windows Exploitation: Pruebas de caja negra.

  • Linux Exploitation: Pruebas de caja negra.

  • AV Evasion & Obfuscation: Evacion del antivirus.

Prerequisites

  • Basic familiarity with TCP & UDP

  • Basic familiarity with Linux & Windows

  • Basic familiarity with Metasploit

Learning Objectives:

  • Students will get an introduction to the exploitation phase of a penetration test.

  • Students will learn how to identify vulnerable services running on a target system.

  • Students will learn how to search for, modify and compile publicly available exploit code.

  • Students will get an understanding of how bind and reverse shells work.

  • Students will get an understanding of the various exploitation frameworks available as well as how they can be used to streamline exploitation.

  • Students will learn how to exploit both Windows & Linux systems in a simulated black box penetration test.

  • Students will learn how to evade signature based AV solutions.

Last updated